Smart Contract Security Vulnerabilities
نویسندگان
چکیده
A smart contract is a concept of computer protocols that helps to facilitate blockchain technology. This blockchain-based public ledger all participating transactions. It considered self-executable application and contains predetermined rules. also operates by decentralizing networks are shared between parties, this execution contracts parties could be securely done without middleman or third party. With technology, developers provide an efficient framework ensure security issues. While the new has successfully been developed prevent problems fraud hacking, there still considerable risk concerning confidentiality. Therefore, we should not underestimate matter. study aims review potential risks may take place on contracts. In addition, options assist in order viable guidance, avoiding these vulnerabilities.
منابع مشابه
Security Vulnerabilities of User Authentication Scheme Using Smart Card
With the exponential growth of Internet users, various business transactions take place over an insecure channel. To secure these transactions, authentication is the primary step that needs to be passed. To overcome the problems associated with traditional password based authentication methods, smart card authentication schemes have been widely used. However, most of these schemes are vulnerabl...
متن کاملSecuring Multi-Application Smart Cards by Security-by-Contract
The Security-by-Contract (S×C) framework has recently been proposed to support applications evolution in multi-application smart cards. The key idea is based on the notion of contract, a specification of the security behavior of an application that must be compliant with the security policy of a smart card. In this paper we address one of the key features needed to apply the S×C idea to a resou...
متن کاملInternational Journal of Smart Grid and Clean Energy Smart Grid Security: Threats, Vulnerabilities and Solutions
The traditional electrical power grid is currently evolving into the smart grid. Smart grid integrates the traditional electrical power grid with information and communication technologies (ICT). Such integration empowers the electrical utilities providers and consumers, improves the efficiency and the availability of the power system while constantly monitoring, controlling and managing the de...
متن کاملIPv6 Security Vulnerabilities
Internet Protocol version 6 (IPv6) is the newest version of the protocol that is used for communications on the Internet. This version has been in existence for many years. But, currently many organizations have slowed their migration to IPv6 because they realize that the security considerations and products for IPv6 might be insufficient, despite the fact that the network infrastructure is rea...
متن کاملSecurity vulnerabilities in IEEE 802.22
Cognitive Radio (CR) is seen as one of the enabling technologies for realizing a new spectrum access paradigm, viz. Opportunistic Spectrum Sharing (OSS). IEEE 802.22 is the world’s first wireless standard based on CR technology. It defines the air interface for a wireless regional area network (WRAN) that uses fallow segments of the licensed (incumbent) TV broadcast bands. CR technology enables...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Erzincan University Journal of Science and Technology
سال: 2023
ISSN: ['1307-9085', '2149-4584']
DOI: https://doi.org/10.18185/erzifbed.1105551